{"id":"https://openalex.org/W4393956435","doi":"https://doi.org/10.1145/3603166.3632553","title":"Cloud Security Frameworks","display_name":"Cloud Security Frameworks","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4393956435","doi":"https://doi.org/10.1145/3603166.3632553"},"language":"en","primary_location":{"id":"doi:10.1145/3603166.3632553","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632553","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632553","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632553","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095559294","display_name":"Taarika Hegde","orcid":"https://orcid.org/0009-0009-6464-4167"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Taarika Hegde","raw_affiliation_strings":["Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"],"raw_orcid":"https://orcid.org/0009-0009-6464-4167","affiliations":[{"raw_affiliation_string":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5095559295","display_name":"Josh Gangl","orcid":"https://orcid.org/0009-0008-6006-8759"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Josh Gangl","raw_affiliation_strings":["Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"],"raw_orcid":"https://orcid.org/0009-0008-6006-8759","affiliations":[{"raw_affiliation_string":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075573905","display_name":"Stanislav Babenko","orcid":"https://orcid.org/0009-0000-5998-871X"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stanislav Babenko","raw_affiliation_strings":["Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"],"raw_orcid":"https://orcid.org/0009-0000-5998-871X","affiliations":[{"raw_affiliation_string":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046121001","display_name":"Joel Coffman","orcid":"https://orcid.org/0000-0002-5500-4450"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]},{"id":"https://openalex.org/I430641","display_name":"United States Air Force Academy","ror":"https://ror.org/0055d0g64","country_code":"US","type":"government","lineage":["https://openalex.org/I1330347796","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I430641"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joel Coffman","raw_affiliation_strings":["Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA","Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States","Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA"],"raw_orcid":"https://orcid.org/0000-0002-5500-4450","affiliations":[{"raw_affiliation_string":"Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA","institution_ids":["https://openalex.org/I430641"]},{"raw_affiliation_string":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States","institution_ids":["https://openalex.org/I145311948"]},{"raw_affiliation_string":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA","institution_ids":["https://openalex.org/I430641","https://openalex.org/I145311948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5095559294"],"corresponding_institution_ids":["https://openalex.org/I145311948"],"apc_list":null,"apc_paid":null,"fwci":0.852,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7990974,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6759636998176575},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6170205473899841},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48901233077049255},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.45709484815597534},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11890953779220581}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6759636998176575},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6170205473899841},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48901233077049255},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.45709484815597534},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11890953779220581}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603166.3632553","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632553","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632553","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3603166.3632553","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632553","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632553","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"},{"id":"https://openalex.org/F4320310145","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95"},{"id":"https://openalex.org/F4320337633","display_name":"U.S. Air Force Academy","ror":"https://ror.org/0055d0g64"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4393956435.pdf","grobid_xml":"https://content.openalex.org/works/W4393956435.grobid-xml"},"referenced_works_count":6,"referenced_works":["https://openalex.org/W2098066710","https://openalex.org/W2296287363","https://openalex.org/W2754849303","https://openalex.org/W2790683457","https://openalex.org/W2989894746","https://openalex.org/W4234388477"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W3148880067","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W1988660452","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W2593645431"],"abstract_inverted_index":{"The":[0],"expansion":[1],"of":[2,12,51,103,113,123],"cloud":[3,25,65,108],"computing":[4,109],"applications":[5],"and":[6,14,27,33,55,74,77,115,117],"services":[7],"has":[8],"introduced":[9],"a":[10,20,48,52,81,134],"number":[11],"control":[13],"audit":[15],"frameworks":[16,32,60],"designed":[17],"to":[18,107,137],"provide":[19],"standard":[21],"around":[22],"data":[23],"access,":[24],"security,":[26],"digital":[28],"enablement.":[29],"While":[30],"certification":[31],"security":[34,67],"standards":[35,68],"have":[36],"become":[37],"the":[38,59,84,91,99,104,138],"de":[39],"facto":[40],"industry":[41],"guidance":[42],"for":[43,58],"IT":[44],"governance,":[45],"there":[46],"is":[47],"notable":[49],"absence":[50],"fundamental":[53],"rating":[54],"review":[56],"system":[57],"themselves.":[61],"This":[62],"research":[63],"evaluates":[64],"provider":[66],"set":[69],"forth":[70],"by":[71,90],"ISO/IEC":[72],"27001":[73],"27002,":[75],"FedRAMP,":[76],"SOC":[78,126],"2":[79,127],"against":[80],"third-party":[82],"benchmark,":[83],"Cloud":[85,92],"Controls":[86],"Matrix":[87],"(CCM)":[88],"created":[89],"Security":[93],"Alliance":[94],"(CSA),":[95],"as":[96,98],"well":[97],"CSA's":[100],"\"Treacherous":[101],"Twelve\"":[102],"top":[105],"threats":[106],"security.":[110],"Recent":[111],"revisions":[112],"ISO/IEC-27001":[114],"27002":[116],"FedRAMP":[118],"significantly":[119],"improve":[120],"their":[121],"coverage":[122,130],"CCM":[124],"controls;":[125],"provides":[128],"less":[129],"overall":[131],"but":[132],"remains":[133],"viable":[135],"alternative":[136],"aforementioned":[139],"certifications.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
